General

  • Target

    aimp_5.30.2563_w64.exe

  • Size

    18.2MB

  • Sample

    240902-qgnz1s1bpp

  • MD5

    9ac82d15c18c9ad12b70e21e6492d160

  • SHA1

    f510b32ebe211ffde8d7e17937120dee62fabc7f

  • SHA256

    2fbb4d951507393872ae4c2b81454f1b41b5a5ef95443f78b10e2d869e3a504a

  • SHA512

    8dcbf68a29273b89d8d11009dc95679cd0a20d729c050b395f6ad87706a0cf6eeeac4e71be6ae4a7bd73e3643c12c25ab428483b66885d199e849b5602b7c698

  • SSDEEP

    393216:JwpS+CnzSSxctsCwF5Aqb3tDaB98tJhcLgQtIh:SpSvnz55na7ssXtIh

Malware Config

Targets

    • Target

      aimp_5.30.2563_w64.exe

    • Size

      18.2MB

    • MD5

      9ac82d15c18c9ad12b70e21e6492d160

    • SHA1

      f510b32ebe211ffde8d7e17937120dee62fabc7f

    • SHA256

      2fbb4d951507393872ae4c2b81454f1b41b5a5ef95443f78b10e2d869e3a504a

    • SHA512

      8dcbf68a29273b89d8d11009dc95679cd0a20d729c050b395f6ad87706a0cf6eeeac4e71be6ae4a7bd73e3643c12c25ab428483b66885d199e849b5602b7c698

    • SSDEEP

      393216:JwpS+CnzSSxctsCwF5Aqb3tDaB98tJhcLgQtIh:SpSvnz55na7ssXtIh

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks